mirror of
https://github.com/CommunitySolidServer/CommunitySolidServer.git
synced 2024-10-03 14:55:10 +00:00

* Solution works but tests don't * refactor(FetchUtil): use arrayifyStream * refactor(FetchUtil): split fetchDataset into 2 separate functions * style(FetchUtil): onelining instead of declaring new local var * test: trying to mock rdfDereferencer * refactor: promise can't have async function as arg * test(FetchUtil): pass Quad array to mockDereference instead * test: all tests should pass now and coverage is back to 100% * style: comment typo * chore: make package.json and package-lock.json compatible with main * chore: fix package.json double entries * chore: updated package.json to be alfabetical again * refactor(AgentGroupAccessChecker): Remove converter from contructor and config * refactor(TokenOwnerShipValidator): Remove converter from constructor and config * refactor(FetchUtil): Return BadRequestHttpError instead of generic Error * test(FetchUtil): return Response object instead of mocking fetch * style: typos and newlines
Identity
Options related to the Identity Provider.
Access
Determines how publicly accessible some IDP features are.
- public: Everything is publicly accessible.
- restricted: The IDP components use the same authorization scheme as the main LDP component.
For example, if the server uses WebACL authorization and the registration endpoint is
/idp/register/
, access to registration can be restricted by creating a valid/idp/register/.acl
resource. WARNING: This setting will write the necessary resources to the.well-known
and IDP containers to make this work. Again in the case of WebACL, this means ACL resources allowing full control access. So make sure to update those two containers so only the correct credentials have the correct rights.
Necessary for sending e-mail when using IDP.
- default: Disables e-mail functionality.
- example: An example of what your e-mail configuration should look like. In that case you should not import anything from this folder but have the settings in your root config.
Handler
Contains everything needed for setting up the Identity Provider.
- default: As of writing there is not much customization possible. This contains everything needed.
Ownership
Which technique to use to determine if a requesting agent owns a WebID.
- token: A token needs to added to the WebID to prove ownership.
- unsafe-no-check: No verification is done, the agent is always believed.
Pod
What to use for pod creation.
- dynamic: Every created pod has its own Components.js config for its ResourceStore, which can differ from the others.
- static: All pod data is stored in separate containers in the same ResourceStore.
Registration
If users should be able to register on the server.
- enabled: Enables registration.
- disabled: Disables registration.